Software Endorsements

  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account

Did you like the App?

  • yes

  • no

  • Stop waisting our time


Results are only viewable after voting.
On that note, what's the alternative (not Tor) for anonymization / obscuring my traffic now that websites are increasingly blockading vpns? Is there a service out there that uses my spare bandwidth to query for pure garbage, obfuscating my true query?
that's interesting to think about. i wouldn't know anything sorry as i haven't heard anything about it but i'd love to know more about this concept.
 
that's interesting to think about. i wouldn't know anything sorry as i haven't heard anything about it but i'd love to know more about this concept.
I don't know what software people would call it but essentially the concept is spam. A randomized, artificially generated list of sites to visit and dwell on from my IP address. With whatever bells and whistles people decide to attach to that concept; maybe it mimics me but errs - searches for details on every vehicle instead of just the one I own - whatever. If I can't hide my traffic I can hide in my traffic instead.
 
Double-post but: see, MullVad already offers to do the thing I was talking about. (Although obviously in their case the traffic is encrypted also.)
Screenshot_2025-12-14_10-21-35.png
Maybe in the near future they'll add an option to run the noise generator while vpn is off, and increase its features generally.

When I search for noise generators I only seem to find defunct github projects, bohužel.
 
Double-post but: see, MullVad already offers to do the thing I was talking about. (Although obviously in their case the traffic is encrypted also.)
View attachment 8286249
Maybe in the near future they'll add an option to run the noise generator while vpn is off, and increase its features generally.

When I search for noise generators I only seem to find defunct github projects, bohužel.
seed torrents lol
 
seed torrents lol
In your opinion is it better to stop using Tor for this website and to activate Mullvad's obscurity features instead? The latency is too high here if I enable them and use Tor simultaneously - and it would help with my clearnet traffic. I tend to need fire-and-forget solutions because I slip up otherwise.
 
In your opinion is it better to stop using Tor for this website and to activate Mullvad's obscurity features instead? The latency is too high here if I enable them and use Tor simultaneously - and it would help with my clearnet traffic. I tend to need fire-and-forget solutions because I slip up otherwise.
you do not need to use fucking tor to browse the kiwi farms. nobody is snooping your fucking connection with ai learning patterns to see if you're posting on the kiwi farms. it's paranoid schizophrenia and i cater to it because it makes people feel better. use whatever soothes your brain worms the most.
 
you do not need to use fucking tor to browse the kiwi farms. nobody is snooping your fucking connection with ai learning patterns to see if you're posting on the kiwi farms. it's paranoid schizophrenia and i cater to it because it makes people feel better. use whatever soothes your brain worms the most.
Unless you're in Germany or the UK
In that case you absolutely need to use fucking tor to browse the kiwi farms.
 
nobody is snooping your fucking connection with ai learning patterns to see if you're posting on the kiwi farms
Hallo good saar,
our Very-Intelligent-Bandwidth-Examining AI has flagged you for terrorism: every time your internet traffic spikes, there is an attack on a poor innocent Indian's izzat. We will come to arrest you as soon as our field agents stop getting hit by trains. You only get this advance notice because we are way more honorable than you, saar.

Here's another version of a letter in the style of a federal agent—this one a little more threatening. Do you want to change the tone further or do you want to add your signature?

Regards
Special agent John Nahasapeemapetilon-Smith
SaarIA
Langley, Virginia
 
Broke:
1765755170724.png
1765754367248.png

Woke:
1765755244608.png
1765754406211.png
1765754758226.png


Heretic is an incredible tool that you can run on your local machine to de-cuck any LLM for local use with minimal loss of quality.
Locally run LLMs are the way of the future if these are to become truly free and beneficial systems.
So, just like the move from mainframes to PCs, hardware for efficient LLM computation is slowly making its way for personal ownership.
You can already buy refurbished (and often well used but very affordable) previously top-of-the-line GPUs that were used for LLMs in the early 2020's, but were swapped out for the next top-of-the-line, leaving these left over for the common man to buy.
I believe the huge GPU prices of the past are now gone as the market supply is increased to satisfy normal consumers with these refurbished and a few years old units.

 
Last edited:
wireproxy - SOCKS5/HTTP proxy server that connects to a Wireguard server.

I'm using it in conjunction with the Firefox Multi-Account Containers extension to browse specific web sites over my VPN, but all other sites over my normal Internet connection. My reason for this is set up is to avoid Internet censorship on specific sites, but minimise VPN blocking, slower speeds and CAPTCHAs by using a VPN for everything.

I'm running wireproxy in an LXC container on my local server. The sample config files provided over complicate things, but below is all I needed.
Code:
WGConfig = /opt/wireproxy/<VPN provider Wireguard config file>

[http]
BindAddress = 0.0.0.0:25344

The Firefox Multi-Account Containers extension is also a little annoying. To add a site to my 'VPN' container, I have to visit it in the container and click always open this site in container. It doesn't support any way to manual add a site domain and sub-domains have to be added seperately. So 'example.com' and 'www.example.com' must be added seperately.

While there was a bit of trial and error getting it set up, I'm finding it more convenient than using seperate browsers for VPN/non-VPN.

Edit: Forgot to add, disabling WebRTC is a good idea to prevent IP and DNS server leakage. I use dnscheck.tools to make sure my IP and DNS servers aren't leaking inside my VPN container.

Also for uBlock origin turn off the 'Uncloak canonical names' setting to prevent DNS server leakage.
 
Last edited:
I'm using it in conjunction with the Firefox Multi-Account Containers extension to browse specific web sites over my VPN, but all other sites over my normal Internet connection.
I'd doing similar, but I just have a script that runs every hour and pulls out all the IP addresses for the "naughty" sites and pushes them to my pfsense firewall's rules that ships those IPs to the VPN. Not as fancy but no setup on any of my client devices needed.
Possibility of leakage due to DNS changes, of course. I could force a filter into the PFSense resolver to only allow the VPNed addresses to be returned for those domains in case of a change between the update cycle.
But that's too much like my day job.
 
While there was a bit of trial and error getting it set up, I'm finding it more convenient than using seperate browsers for VPN/non-VPN.
Was the choice to use Multi Account Containers for any semblance of separation or just for the convenience of selectively applying a proxy? If the latter, then I wonder if you might make your life easier by creating a PAC file.

Is your VPN provider Mullvad? If so then you don't need to run wireproxy, you can split tunnel and access their SOCKS5 hosts directly which gives you the flexibility to move from endpoint to endpoint very fast. I just have AllowedIPs = 10.124.0.0/16 in my config for the split tunnel as that's the CIDR they seem to operate all their SOCKS5 hosts in.
 
Was the choice to use Multi Account Containers for any semblance of separation or just for the convenience of selectively applying a proxy? If the latter, then I wonder if you might make your life easier by creating a PAC file.
I have considered, but have not yet got round to applying, Mr. Guilty Spark's solution myself. Basing things on the containers you access specific websites in is the least bad solution for this sort of thing.

Basically every single site on the internet references marketing various tracking domains, whether explicit advertising trackers or Google's font libraries. If you use a PAC based solution, then those requests can only ever go through one proxy.... so for everything that references a domain that you might access from different containers, you'll be sending out referrer headers to CDNs and ad trackers referencing websites you aren't even accessing through that same proxy. If you use container based proxies, you can have actual separation.

I'm not saying it's perfect if you have already become a specific nation state target. But it's substantively better than any similar solution for splitting traffic in this way..
 
Was the choice to use Multi Account Containers for any semblance of separation or just for the convenience of selectively applying a proxy? If the latter, then I wonder if you might make your life easier by creating a PAC file.
What ⠠⠠⠅⠑⠋⠋⠁⠇⠎ ⠠⠠⠊⠎ ⠠⠠⠁ ⠠⠠⠋⠁⠛ said basically. I just tested a PAC file and my IP address leaks when I try just proxying dnscheck.tools. Multi Account Containers makes sure the tab is entirely proxied. The list of sites I proxy is small and I don't see myself adding to it frequently.

Is your VPN provider Mullvad? If so then you don't need to run wireproxy, you can split tunnel and access their SOCKS5 hosts directly which gives you the flexibility to move from endpoint to endpoint very fast. I just have AllowedIPs = 10.124.0.0/16 in my config for the split tunnel as that's the CIDR they seem to operate all their SOCKS5 hosts in.
No, I'm using Windscribe. Their app does have a feature for running a local SOCKS5 proxy. But I prefer having wireproxy running on my server rather than the Windscribe app running on each of my machines. I don't change Windscribe servers frequently, so convenience of switching between is not an issue (at least at the moment).
 
Is Macrium dead software walking? They used to sell direct license keys, now on subscription model. Subscription model is not immediate cause of hatred for me, it can be done well. But Internet was disconnected for like 2 seconds and I got a message that the license could not be verified and that it was in restore mode only. Literally could not make a new backup or anything with the software just like that. Seriously? Even pozware like Adobe CC will give you a grace period.
 
Is Macrium dead software walking?
Yes, you have to find an archive of the last free standalone installer that wasn't subscription based and lock it out of updates. Or find an alternative that treats you like a human being. Funny how for all the shit Microsoft gets they still are extremely generous with how they offer Windows when shitware like Macrium or Adobe exists.
 
Is Macrium dead software walking? They used to sell direct license keys, now on subscription model. Subscription model is not immediate cause of hatred for me, it can be done well. But Internet was disconnected for like 2 seconds and I got a message that the license could not be verified and that it was in restore mode only. Literally could not make a new backup or anything with the software just like that. Seriously? Even pozware like Adobe CC will give you a grace period.
If you just want to image a disk, use disk2vhd to create a VHDX file. They can be mounted natively in Windows (double click on it), it can be done while the volume is in use and it's fast.
 
If you just want to image a disk, use disk2vhd to create a VHDX file. They can be mounted natively in Windows (double click on it), it can be done while the volume is in use and it's fast.
Macrium does exactly what I want and I was fine paying for it, but losing the license just because of an network outage is pure 🌙 especially for backup software.

It was probably some bean counting moron who decided to kill the golden goose.
 
Back
Top Bottom